Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
Plex Media servers actively abused to amplify DDoS attacks
#1
Plex Media Server systems are actively being abused by DDoS-for-hire services as a UDP reflection/amplification vector in Distributed Denial of Service (DDoS) attacks.

Plex Media Server provides users with a streaming system compatible with the Windows, macOS, Linux, and FreeBSD platforms, as well as network-attached storage (NAS) devices, Docker containers, and more.

Netscout says that amplified PMSSDP DDoS attacks observed since November 2020 have been abusing UDP/32414 SSDP HTTP/U responses from exposed broadband Internet access routers and redirected towards attackers' targets.

This junk traffic reflected onto victims' servers is sourced from Simple Service Discovery Protocol (SSDP) probes sent by Plex through the G’Day Mate (GDM) protocol for local network service discovery.

In January, Baidu Security Lab also reported observing DDoS attacks using Plex as an amplification vector.

According to a subsequent report from ZoomEye, not all Plex Media Server versions can be abused by attackers.

"After testing by Baidu Lab researchers, it was found that the version of Plex used to attack was less than version 1.21, so it can be inferred that version 1.21 of Plex released in late January this year has fixed this problem (although no relevant information has been seen in the plex official Security bulletin)," ZoomEye said.

Abused in single and multi-vector DDoS attacks
Attacks abusing this UDP reflection/amplification attack vector by targeting PMSSDP reflectors/amplifiers on the UDP/32414 port have an amplification ratio of ~4.68:1 and peak at ~3 Gbps.

However, as Netscout said, "multi-vector (2–10 vectors) and omni-vector (11 or more vectors) attacks incorporating PMSSDP range from the low tens of Gbps up to 218 Gbps."

Attackers can exploit roughly 27,000 exposed devices running Plex Media Server to amplify and reflect DDoS traffic onto their targets systems.

"It should be noted that a single-vector PMSSDP reflection/amplification attack of ~2 Gbps – ~3 Gbps in size is often sufficient to have a significant negative impact on the availability of targeted networks/servers/services," Netscout added.

"The incidence of both single-vector and multi-/omni-vector reflection/amplification attacks leveraging PMSSDP has increased significantly since November of 2020, indicating its perceived utility to attackers."

As it regularly happens with newer DDoS attack vectors, PMSSDP has also been weaponized and is now actively used by booter/stresser DDoS-for-hire services.

These platforms are regularly used by pranksters or threat actors without the skills or time to invest in establishing their own DDoS attack infrastructure.

Booters' services are rented to launch large-scale DDoS attacks targeting servers or sites to trigger a denial of service that usually brings them down or disrupts online services.


Source
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Over 640 Citrix servers backdoored with web shells in ongoing attacks mrtrout 0 769 08-03-2023 , 07:56 PM
Last Post: mrtrout
  Cloudflare report highlights devastating DDoS attacks on VoIP services mrtrout 0 791 11-06-2021 , 09:08 PM
Last Post: mrtrout
  DDoS attacks hit multiple email providers mrtrout 0 1,165 10-23-2021 , 09:03 AM
Last Post: mrtrout
  Bandwidth.com is latest victim of DDoS attacks against VoIP providers tarekma7 0 717 10-02-2021 , 03:06 PM
Last Post: tarekma7
  Ransomware now attacks Microsoft Exchange servers with ProxyLogon exploits tarekma7 0 1,068 03-12-2021 , 04:13 PM
Last Post: tarekma7

Forum Jump:


Users browsing this thread: 1 Guest(s)